November Windows Updates Broke Kerberos Authentication

Windows updates and Kerberos authentication
Written by Emma Davis

Microsoft says they are already aware of a new issue in Windows updates that causes corporate domain controllers to fail when using Kerberos authentication, as well as other authentication issues that have emerged since the November patches.

Let me remind you that we wrote that Microsoft Updates May Break Printing in Windows Server, and also that Microsoft Silently Fixes ShadowCoerce Bug.

Let me remind you that the Kerberos protocol has long since replaced NTLM and has become the default authentication protocol for domain-joined devices in all versions of Windows above Windows 2000.

Bleeping Computer writes that immediately after the release of the November updates, users began to complain about the operation of Kerberos “in situations where you set the account settings to “This account supports 256-bit Kerberos AES encryption” or “This account supports 128-bit Kerberos encryption AES” (for example, the msDS-SupportedEncryptionTypes attribute) in user accounts in AD.”

According to Microsoft developers, the issue that arose after the updates can affect any scenario related to Kerberos authentication in enterprise environments.

After installing updates released on November 8, 2022 or later, on Windows servers with the role of a domain controller, you may experience problems with Kerberos authentication. When a problem occurs, you may receive a Microsoft-Windows-Kerberos-Key-Distribution-Center error with Event ID 14 in the System section of the event log on your domain controller.Microsoft explained.

In the logs, such errors are marked with the key phrase “the missing key has an ID of 1”.

The issue may occur in, but is not limited to, the following use cases for Kerberos authentication.

  1. Domain user logon may fail. This can also affect Active Directory Federation Services (AD FS) authentication.
  2. Authentication may not work when using Group Managed Service Accounts (gMSA) for services such as Internet Information Services (IIS Web Server).
  3. Remote desktop connections using domain users may not work.
  4. There may be problems accessing shared folders on workstations and file shares on servers.
  5. Printing that requires domain user authentication may fail.

The full list of affected platforms includes both client and server versions.

  1. Clients: Windows 7 SP1, Windows 8.1, Windows 10 Enterprise LTSC 2019, Windows 10 Enterprise LTSC 2016, Windows 10 Enterprise 2015 LTSB, Windows 10 20H2 and later, and Windows 11 21H2 and later.
  2. Servers: Windows Server 2008 SP2 or newer, including the latest Windows Server 2022.

Microsoft said they are already working on a fix for this issue and expect a fix to be released “in the coming weeks.” It would be nice if the decision did not stretch for years, as in this case.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Emma Davis

I'm writer and content manager (a short time ago completed a bachelor degree in Marketing from the Gustavus Adolphus College). For now, I have a deep drive to study cyber security.

Leave a Reply


This site uses Akismet to reduce spam. Learn how your comment data is processed.